CN113300844B - 一种公私角色固定的非对称密钥设置方法 - Google Patents
一种公私角色固定的非对称密钥设置方法 Download PDFInfo
- Publication number
- CN113300844B CN113300844B CN202110399039.5A CN202110399039A CN113300844B CN 113300844 B CN113300844 B CN 113300844B CN 202110399039 A CN202110399039 A CN 202110399039A CN 113300844 B CN113300844 B CN 113300844B
- Authority
- CN
- China
- Prior art keywords
- key
- bits
- plaintext
- public
- private
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000012795 verification Methods 0.000 claims abstract description 4
- 238000004364 calculation method Methods 0.000 abstract description 5
- 230000005540 biological transmission Effects 0.000 description 3
- 238000005336 cracking Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110399039.5A CN113300844B (zh) | 2021-04-14 | 2021-04-14 | 一种公私角色固定的非对称密钥设置方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110399039.5A CN113300844B (zh) | 2021-04-14 | 2021-04-14 | 一种公私角色固定的非对称密钥设置方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113300844A CN113300844A (zh) | 2021-08-24 |
CN113300844B true CN113300844B (zh) | 2022-06-17 |
Family
ID=77319696
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110399039.5A Active CN113300844B (zh) | 2021-04-14 | 2021-04-14 | 一种公私角色固定的非对称密钥设置方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113300844B (zh) |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1193538C (zh) * | 2001-12-17 | 2005-03-16 | 北京兆日科技有限责任公司 | 电子密码形成与核验方法 |
CN103427987B (zh) * | 2012-05-25 | 2016-05-18 | 纬创资通股份有限公司 | 数据加密的方法、数据验证方法及电子装置 |
-
2021
- 2021-04-14 CN CN202110399039.5A patent/CN113300844B/zh active Active
Also Published As
Publication number | Publication date |
---|---|
CN113300844A (zh) | 2021-08-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Thabit et al. | A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions | |
Barakat et al. | An introduction to cryptography | |
KR100259179B1 (ko) | 암호화 통신 처리 | |
WO2001030020A1 (fr) | Systeme de cryptage de cle a longueur variable | |
CN109474425B (zh) | 一种基于多个共享密钥获得任意指定长度派生密钥的方法 | |
CN109450615A (zh) | 一种高效的opc ua客户端与服务器端数据传输加密方法 | |
EP3494663A1 (en) | Methods and systems for enhanced data-centric encryption systems using geometric algebra | |
CN109344627B (zh) | 一种新型香农完美保密方法 | |
WO2009115824A1 (en) | Encryption method | |
Zhao | DES-Co-RSA: a hybrid encryption algorithm based on DES and RSA | |
CN109756335A (zh) | 一种阶为梅森素数的有限域乘法群的公钥加密解密方法 | |
CN107846422A (zh) | 一种网关的配置文件加密压缩和解密解压缩的方法 | |
CN108599941A (zh) | 随机非对称扩充字节通信数据加密方法 | |
CN102064938B (zh) | 一种基于多变量与不确定性的公钥加密方法 | |
US20060251248A1 (en) | Public key cryptographic methods and systems with preprocessing | |
CN113300844B (zh) | 一种公私角色固定的非对称密钥设置方法 | |
CN107483206B (zh) | 一种快速的量子安全的非对称加密方法 | |
Kumar et al. | Hybridization of Cryptography for Security of Cloud Data | |
US20130058483A1 (en) | Public key cryptosystem and technique | |
Schaefer | An introduction to cryptography and Cryptanalysis | |
US20080019508A1 (en) | Public key cryptographic methods and systems with rebalancing | |
CN112367159B (zh) | 一种面向医疗数据安全存储的混合加、解密方法及系统 | |
Paar | Applied cryptography and data security | |
CN109409106B (zh) | 一种新型无穷字母表的香农完美保密方法 | |
Rushdi et al. | A pedagogical multi-key multi-stage package to secure communication channels |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20210824 Assignee: Hangzhou Yuxuansheng Lighting Technology Co.,Ltd. Assignor: JIANG University OF TECHNOLOGY Contract record no.: X2022330000929 Denomination of invention: An Asymmetric Key Setting Method with Fixed Public and Private Roles Granted publication date: 20220617 License type: Common License Record date: 20221229 Application publication date: 20210824 Assignee: Lingqi Internet of Things Technology (Hangzhou) Co.,Ltd. Assignor: JIANG University OF TECHNOLOGY Contract record no.: X2022330000931 Denomination of invention: An Asymmetric Key Setting Method with Fixed Public and Private Roles Granted publication date: 20220617 License type: Common License Record date: 20221229 Application publication date: 20210824 Assignee: Hangzhou Hibiscus Information Technology Co.,Ltd. Assignor: JIANG University OF TECHNOLOGY Contract record no.: X2022330000902 Denomination of invention: An Asymmetric Key Setting Method with Fixed Public and Private Roles Granted publication date: 20220617 License type: Common License Record date: 20221228 Application publication date: 20210824 Assignee: Zhejiang Yu'an Information Technology Co.,Ltd. Assignor: JIANG University OF TECHNOLOGY Contract record no.: X2022330000897 Denomination of invention: An Asymmetric Key Setting Method with Fixed Public and Private Roles Granted publication date: 20220617 License type: Common License Record date: 20221228 |
|
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20210824 Assignee: Taizhou Linhai Xinxing Safety Technology Training Co.,Ltd. Assignor: JIANG University OF TECHNOLOGY Contract record no.: X2023980047386 Denomination of invention: A method for setting asymmetric keys with fixed public and private roles Granted publication date: 20220617 License type: Common License Record date: 20231117 |
|
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20210824 Assignee: Hangzhou Yizheng Technology Co.,Ltd. Assignor: JIANG University OF TECHNOLOGY Contract record no.: X2023980054807 Denomination of invention: A method for setting asymmetric keys with fixed public and private roles Granted publication date: 20220617 License type: Common License Record date: 20240102 Application publication date: 20210824 Assignee: Hangzhou Tianyin Computer System Engineering Co.,Ltd. Assignor: JIANG University OF TECHNOLOGY Contract record no.: X2023980054814 Denomination of invention: A method for setting asymmetric keys with fixed public and private roles Granted publication date: 20220617 License type: Common License Record date: 20240102 |
|
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20210824 Assignee: HANGZHOU YONGGUAN NETWORK TECHNOLOGY CO.,LTD. Assignor: JIANG University OF TECHNOLOGY Contract record no.: X2024980000361 Denomination of invention: A method for setting asymmetric keys with fixed public and private roles Granted publication date: 20220617 License type: Common License Record date: 20240109 |